Control: 1.3 Ensure that 'Restrict non-admin users from creating tenants' is set to 'Yes'
Description
Require administrators or appropriately delegated users to create new tenants.
It is recommended to only allow an administrator to create new tenants. This prevent users from creating new Azure AD or Azure AD B2C tenants and ensures that only authorized users are able to do so.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
- Select
Microsoft Entra ID
- Select
Users
- Select
User settings
- Set
Restrict non-admin users from creating tenants
toYes
From PowerShell
Import-Module Microsoft.Graph.Identity.SignInsConnect-MgGraph -Scopes 'Policy.ReadWrite.Authorization'Select-MgProfile -Name beta$params = @{DefaultUserRolePermissions = @{ AllowedToCreateTenants = $false }}Update-MgPolicyAuthorizationPolicy -AuthorizationPolicyId -BodyParameter$params
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v210_1_3
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v210_1_3 --share
SQL
This control uses a named query:
ad_manual_control